Alerting examples

This bundle enhances the Kibana alerting experience. Storing all relevant information in indices and visualize the data in dashboards.

This watch is getting data from the Elasticsearch shards API directly and checking for large shards.

A watch which alerts if the time spent by a hosts CPU in IOWait, has increased by more than than N% in the last Y mins. N defaults to 5%,…

This watch checks the availability of your Heartbeat observed services. It will trigger an alert whenever at least one of your services is down.


More about Alerting

Alerting within in ELK Stack or better call it the Elastic Stack is easy. Elastic offers a couple of different ways to make alerting possible.

The first option is to use Kibana Alerts and Actions:

Kibana Alerts allow you to detect complex conditions in different Kibana applications and trigger actions when these conditions are met. Alerts are integrated with observability, security, maps, and machine learning, can be centrally managed from the management UI, and provide a set of built-in actions and alerts (called stack alerts) for your use.

Another option is using Watcher:

Watcher is built in and executed within Elasticsearch. It is a very powerful JSON defined way to built alerting and automization jobs. However its not pretty intuitive how to start in an advanced watcher job.

In this section you can download watcher and other alerting examples based on the ELK stack.